Volgen
Karim Lounis
Karim Lounis
Assistant Professor at ENSIA, The National School of Artificial Intelligence, Algeria.
Geverifieerd e-mailadres voor ensia.edu.dz
Titel
Geciteerd door
Geciteerd door
Jaar
Attacks and Defenses in Short-Range Wireless Technologies for IoT
K Lounis, M Zulkernine
IEEE Access 8, 88892-88932, 2020
1282020
Fast Authentication in Wireless Sensor Networks
C Benzaid, K Lounis, A Al-Nemrat, N Badache, M Alazab
Future Generation Computer Systems 55, 362-375, 2016
912016
Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
International Conference on Quantitative Evaluation of Systems, 159-162, 2016
612016
Bad-Token: Denial of Service Attacks on WPA3
K Lounis, M Zulkernine
12th International Conference on Security of Information and Networks, 1-8, 2019
342019
T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT
K Lounis, M Zulkernine
IEEE Access 8, 137384-137405, 2021
302021
Bluetooth Low Energy Makes "Just Works" not Work
K Lounis, M Zulkernine
3rd Cyber Security in Networking Conference, 2019
292019
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
R Jhawar, K Lounis, S Mauw
International Workshop on Security and Trust Management, 138-153, 2016
282016
CSKES: A Context-based Secure Keyless Entry System
J Wang, K Lounis, M Zulkernine
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
262019
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Digital Threats: Research and Practice, 33, 2021
252021
WPA3 Connection Deprivation Attacks
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 164-176, 2019
252019
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
R Jhawar, K Lounis, S Mauw, Y Ramırez-Cruz
International Workshop on Security and Trust Management, 2018
232018
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus
K Lounis, Z Mansour, M Wrana, MAA Elsayed, SHH Ding, M Zulkernine
IEEE Transactions on Aerospace and Electronic Systems, 19, 2022
182022
D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions
K Lounis, HHD Steven, M Zulkernine
IEEE Transactions on Vehicular Technology, 16, 2022
152022
Stochastic-based Semantics of Attack-Defense Trees for Security Assessment
K Lounis
International Workshop on Practical Applications of Stochastic Modelling 337 …, 2017
152017
Exploiting Race Condition for Wi-Fi Denial of Service Attacks
K Lounis, M Zulkernine
13th International Conference on Security of Information and Networks (SIN …, 2020
132020
Modeling Attack-Defense Trees' Countermeasures using Continuous Time Markov Chains
K Lounis, S Ouchani
2nd International Workshop on Automated and Verifiable Software System …, 2020
132020
AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles
MAA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine
IEEE Transactions on Intelligent Transportation Systems, 2022
102022
Security of Wireless Short-Range Technologies and an Authentication Protocol for IoT
K Lounis
Ph. D. dissertation, School Comput., Queen’s Univ., Kingston, ON, Canada, 2020
9*2020
Connection Dumping Vulnerability Affecting Bluetooth Availability
K Lounis, M Zulkernine
International Conference on Risks and Security of Internet and Systems, 188-204, 2018
92018
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
K Lounis, M Zulkernine
Cryptology ePrint Archive, 2021
72021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20